CPO442 Cybersecurity Principles & Organisational Practice Assignment Help
ASSESSMENT 1 BRIEF |
|
Subject Code and Title |
CPO442 Cybersecurity Principles and Organisational Practice |
Assessment |
Report |
Individual/Group |
Individual |
Length |
500 words (+/- 10%) plus diagrams |
Learning Outcomes |
The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Describe human factors and their cybersecurity consequences on business operations b) Appraise cybersecurity standards and governance requirements to safeguard humans users within an organisation |
Submission |
12-week duration: Due by 11:55pm AEST/AEDT Sunday end of Module 4(Week 4). 6-week duration: Due by Due by 11:55pm AEST/AEDT Sunday end of Module 4 (Week 2). |
Weighting |
25% |
Total Marks |
100 marks |
Assessment Task
Write a 500-word (+/- 10%) report about the human factor in a company’s cybersecurity environment. The report will explore the influence of the human factor in cybersecurity and the legal or other regulatory requirements that apply to cybersecurity practices. The content of the report must be supported by relevant diagrams.
Please refer to the instructions section below for details of how to complete this task.
Context
Cybersecurity is a broad field that includes many different areas of expertise. Anyone working in cybersecurity must possess a basic knowledge of field related terminology and general procedures. This includes knowledge of key technical and organisational methods that can be used to implement security measures, how the human factor influences key decisions regarding which security methods to implement and why the human factor needs to be addressed when setting up a cybersecurity project. In this assessment you will need to write a report which addresses specific questions around
that knowledge in order to prepare you for your future studies and work in cybersecurity related roles.
Instructions
To complete this assessment task, you must write a 500-word (+/- 10%) report discussing the importance of the human factor in a company’s cybersecurity environment. Please review all learning resources for Modules 1-3 prior to writing the report.
The content of the report should:
o provide a definition of cybersecurity
o explain why addressing cybersecurity is an ongoing task for an organisation o discuss recent cybersecurity threats and attacks and how they are exploited by hackers
o evaluate attack vectors that are not user-specific (e.g., brute-force password attack) o evaluate successful attack vectors which are specific to human activities (user specific)
o discuss the role of governance, which is based on cybersecurity frameworks and determines the regulations and/or laws that are required for effective cybersecurity practices
o include a list of applicable local (Australian) and international laws and branch specific regulations that have been created by business organisations. (Please ensure that you include indirect regulations that require cyber security measures), and;
o include relevant diagrams which demonstrate the relationships between human activity, cybersecurity threats and cybersecurity attack vectors.
The report should be written for people with very limited technical knowledge.
In addition to the recommended readings from Modules 1-3 you must support your report with further information obtained by reviewing peer reviewed articles and textbooks. Search specifically using the terms “cybersecurity governance” and “human factors in cybersecurity”.
Please review the Academic Skills page for further support with formatting your report: Report Writing – Academic Skills – Assessment Preparation – Library at Torrens
Referencing
It is essential that you use current APA style for citing and referencing the sources that you use. Please see more information on citing and referencing guidelines on the Academic Skills webpage.
Submission Instructions
Submit this task via the Assessment 1 link in the main navigation menu in CPO442 Cybersecurity Principles and Organisational Practice. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
Academic Integrity
All students are responsible for ensuring that all work submitted is their own, is academically written and appropriately referenced following the Academic Writing Guide. Students also need to have read and be aware of Torrens University Australia Academic integrity policy and procedures and subsequent penalties for academic misconduct. These are available online.
Students must also keep a copy of all submitted material and any assessment drafts.
Special Consideration
To apply for special consideration for a modification to an assessment task or exam due to unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completed Application for Assessment Special Consideration Form to your Learning Facilitator.